Chapter 2 Understanding Identity and Access Management Flashcards

1
Q

___________ occurs when users claim (or profess) their identity with identifiers such as usernames or email addresses.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Users then prove their identity with _________, such as with a password.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False : You can’t have any type of access control if you can’t identify a user.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False : Authentication, authorization, and accounting (AAA) work together with identification to provide a comprehensive access management system.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Users are granted __________ to access resources based on their proven identity.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___________ methods track user activity and record the activity in logs.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An _____ ____ allows security professionals to re-create the events that preceded a security incident.

A

Audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False : A use case of supporting authentication may require administrators to implement one factor of authentication for basic authentication, two factors for more secure authentication, or more factors for higher security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List factors for authentication

A
  1. Something you know - PIN, password
  2. Something you have - CAC, Smart card
  3. Something you are - Biometric - fingerprint, retina, face
  4. Something you are such as you location
  5. Something you do - pattern swipe, gestures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ________ __ _____ authentication factor typically refers to a shared secret, such as a password or even a PIN.

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the least secure form of authentication?

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False :

A strong password is of sufficient length, doesn’t include words found in a dictionary or any part of a user’s name, and combines at least three of the four following character types:
• Uppercase characters (26 letters A–Z)
• Lowercase characters (26 letters a–z)
• Numbers (10 numbers 0–9)
• Special characters (32 printable characters, such as !, $, and *)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does MS recommend for minimum password length as of 2016?

A

14 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False : The combination of different characters in a password makes up the key space, and you can calculate the key space with the following formula: C^N (CN). C is the number of possible characters used, and N is the length of the password

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False : An attacker can crack a 10-character password using only lowercase characters (141 trillion possibilities)in less than two hours.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why do security experts say that too complex passwords are less secure?

A

Because it is more difficult to remember and users will likely write it down or store in an insecure file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or False : Complex passwords use a mix of character types. Strong passwords use a mix of character types and have a minimum password length of at least 14 characters

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or False : It’s not important for an organization to provide adequate training to users on password security.

(Page 172).

A

False

It is important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False : Users should change their passwords regularly, such as every 45 or 90 days.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False : Before resetting passwords for users, it’s important to verify the user’s identity. When resetting passwords manually, it’s best to create a temporary password that expires upon first use.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A _______ _______ system remembers past passwords and prevents users from reusing passwords

A

Password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False : It’s common for password policy settings to remember the last 24 passwords and prevent users from reusing these until they’ve used 24 new passwords

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____ ______ allows an administrator to configure a setting once in a ______ ______ ______ and apply this setting to many users and computers within the domain.

A

Group Policy, Group Policy Object (GPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False : Group Policy is implemented on a domain controller within a domain. Administrators use it to create password policies, implement security settings, configure host-based firewalls, and much more

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A common group of settings that administrators configure in Group Policy is the _______ Policy settings

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

List some of the elements of password policies

A
  1. Minimum password age - to prevent users from reusing a previous password
  2. Maximum password age - to trigger expiration
  3. Minimum password length - to promote complexity
  4. Password complexity requirements - to promote complexity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

True or False : Accounts will typically have lockout policies preventing users from guessing the password

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

List two key phrases associated with lockout policies

A
  1. Account lockout threshold - number of attempts before locking account
  2. Account lockout duration - length of time before account is unlocked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A basic security practice is to change _______ settings before putting a system into use.

A

Default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

True or False : Some administrators create a dummy account named administrator which has no permissions.

A

True

If an attempt is made with this account the system will lock the account out and alert administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The _______ ___ _____ authentication factor refers to something you can physically hold.

A

Something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

_____ ______ are credit card-sized cards that have an embedded microchip and a certificate. Users insert them into a reader, similar to how someone would insert a credit card into a credit card reader.

A

Smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

List the requirements for a smart card

A
  1. Embedded certificate - cert holds a user’s private key and matched with a public key (available to others for use). Private key is used each time the user logs on
  2. Public Key Infrastructure (PKI) - supports issuing and managing certs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A _____ ______ _____ is a specialized type of smart card used by the U.S. Department of Defense.

A

Common Access Card (CAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

True or False : A CAC card includes a photo of the user and can be used as a form of identification

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A _______ _____ ________ card is a specialized type of smart card used by U.S. federal agencies. It also includes photo identification and provides confidentiality, integrity, authentication, and non-repudiation for the users, just as a CAC does

A

Personal Identity Verification (PIV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

True or False : Smart cards are often used with dual-factor authentication where users have something (the smart card) and know something (such as a password or PIN). Smart cards include embedded certificates used with digital signatures and encryption. CACs and PIVs are specialized smart cards that include photo identification. They are used to gain access into secure locations and to log on to computer systems.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A ______ or ___ __ is an electronic device about the size of a remote key for a car

A

token or key fob (sometimes simply called a fob)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

True or False : A token includes a liquid crystal display (LCD) that displays a number, and this number changes periodically, such as every 60 seconds.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The _____ is synced with a server that knows what the number is at any moment.

A

Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

_______ ______ ___ ____ ______ is an open standard used for creating one-time passwords, similar to those used in tokens or key fobs.

A

HMAC-based One-Time Password (HOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

True or False : A password created with HOTP remains valid until it’s used.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A ____ _____ ___ ____ _______ is similar to HOTP, but it uses a timestamp instead of a counter.

A

Time-based One-Time Password (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

True or False : One significant benefit of HOTP and TOTP is price. Hardware tokens that use these open source standards are significantly less expensive than tokens that use proprietary algorithms

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

TOTP expires after __ seconds

A

30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The ________ ___ ___ authentication factor uses biometrics for authentication

A

Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

True or False : Biometric methods are the strongest form of authentication because they are the most difficult for an attacker to falsify.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

________ use a physical characteristic, such as a fingerprint, for authentication

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

List some types of biometrics

A
  1. Fingerprint scanner
  2. Retina scanner
  3. Iris scanner
  4. Voice recognition
  5. Facial recognition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

True or False : A drawback with facial recognition is that it is sometimes negatively affected by changes in lighting.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

List two biometric false readings

A
  1. False acceptance

2. False rejection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The _____ ______ ____ identifies the percentage of times false acceptance occurs

A

False acceptance rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The _____ _________ ____ identifies the percentage of times false rejections occur

A

False rejection rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

True or False : True acceptance is when the biometric system accurately determines a positive match

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

True or False : True rejection occurs when the biometric system accurately determines a non-match

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

By increasing the sensitivity for a biometric, it ________ the number of false matches and ________ the number of false rejections

A

Decreases, increases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Decreasing the sensitivity for a biometric ______ the false matches and ________ the false rejections.

A

Increases,decreases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

True or False : By plotting the FAR and FRR rates using different sensitivities, you can determine the effectiveness of a biometric system

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

The ________ ____ ____ is the point where the FAR crosses over with the FRR

A

Crossover error rate (CER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

True or False : A lower CER indicates that the biometric system is more accurate

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

The _______ ___ ___ authentication factor identifies a user’s location

A

Somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

True or False : Many authentication systems use the Internet Protocol (IP) address for geolocation

A

True

63
Q

True or False : Within an organization, it’s possible to use the computer name or the media access control (MAC) address of a system for the somewhere you are factor

A

True

64
Q

The ________ ___ __ authentication factor refers to actions you can take such as gestures on a touch screen

A

Something you do

65
Q

True or False : Some examples of something you do are gestures, keystroke dynamics

A

True

66
Q

____ _____ ____________ uses two different factors of authentication, such as something you have and something you know

A

Dual-factor authentication (sometimes called two-factor authentication)

67
Q

__________ ____________ uses two or more factors of authentication

A

Multifactor authentication

68
Q

True or False : Using two methods of authentication in the same factor is dual- factor authentication.

A

False

They must be two different factors

69
Q

True or False : Using two or more methods in the same factor of authentication (such as a PIN and a password) is single-factor authentication. Dual-factor (or two-factor) authentication uses two different factors, such as using a hardware token and a PIN. Multifactor authentication uses two or more factors

A

True

70
Q

______ is a network authentication mechanism used within Windows Active Directory domains and some Unix environments known as realms

A

Kerberos

71
Q

True or False:

The requirements for kerberos are:

  1. Method of issuing tickets used for authentication
  2. Time synchronization - v5 all systems synced within five minutes of each other
  3. A database of subjects or users i.e. MS AD
A

True

72
Q

The __ _______ _____ uses a complex process of issuing ticket granting tickets (TGTs) and other tickets.

A

Key Distribution Center (KDC)

73
Q

Kerberos uses _________ ___ cryptography to prevent unauthorized disclosure and to ensure confidentiality.

A

Symmetric-key

74
Q

___ ______ ___ ______ is a suite of protocols that provide authentication, integrity, and confidentiality within Windows systems

A

New Technology LAN Manager (NTLM)

75
Q

True or False : Developers should use the Negotiate security package within their applications since it selects the most secure security protocols available between the systems

A

True

76
Q

_________ ______ ______ _______ specifies formats and methods to query directories.

A

Lightweight Directory Access Protocol (LDAP)

77
Q

True or False : Windows domains use Active Directory, which is based on LDAP. Active Directory is a directory of objects (such as users, computers, and groups), and it provides a single location for object management.

A

True

78
Q

True or False : LDAP Secure (LDAPS) uses encryption to protect LDAP transmissions.

A

True

79
Q

True or False : LDAP is based on an earlier version of X.500. Windows Active Directory domains and Unix realms use LDAP to identify objects in query strings with codes such as CN=Users and DC=GetCertifiedGetAhead. LDAPS encryptstransmissions with TLS

A

True

80
Q

______ ___ __ refers to the ability of a user to log on or access multiple systems by providing credentials only once

A

Single sign-on (SSO)

81
Q

True or False : SSO increases security because the user only needs to remember one set of credentials and is less likely to write them down. It’s also much more convenient for users to access network resources if they only have to log on one time.

A

True

82
Q

True or False : The SSO system typically creates some type of SSO secure token used during the entire logon session. Each time the user accesses a network resource, the SSO system uses this secure token for authentication. Kerberos and LDAP both include SSO capabilities.

A

True

83
Q

SSO requires strong ___________ to be effective.

A

Authentication

84
Q

A _______ trust creates an indirect trust relationship.

A

Transitive

A –> B –> C : A –> C

85
Q

True or False : There is a two-way trust between parent domain and child domain. Child domains also have a two way transitive trust with each other thru their relationship with the parent domain

A

True

86
Q

True or False : Without a trust relationship, separate accounts need to be created per domain

A

True

87
Q

________ ______ _______ _______ is an Extensible Markup Language (XML)– based data format used for SSO on web browsers.

A

Security Assertion Markup Language (SAML)

88
Q

List three SAML defined roles

A
  1. Principal - typically a user
  2. Identity provider - creates, maintains, and manages identity information
  3. Service provider - an entity that provides services to principals
89
Q

True or False : The primary purpose of SSO is for identification and authentication of users.

A

True

90
Q

True or False : SSO provides authorization

A

False

91
Q

True or False : Many federation SSO systems, including SAML, include the ability to transfer authorization data between their systems

A

True

92
Q

True or False : It’s possible to use SAML for single sign-on (SSO) authentication and authorization

A

True

93
Q

True or False : SSO systems can connect authentication mechanisms from different environments i.e. different operating systems

A

True

94
Q

A _________ requires a federated identity management system that all members of the federation use

A

Federation

95
Q

True or False : Members of the federation agree on a standard for federated identities and then exchange the information based on the standard. A federated identity links a user’s credentials from different networks or operating systems, but the federation treats it as one identity.

A

True

96
Q

_____ is an open standard for authorization many companies use to provide secure access to protected resources.

A

OAuth

97
Q

True or False : With OAuth, you can often use the same account that you’ve created with Google, Facebook, PayPal, Microsoft, or Twitter

A

True

98
Q

______ Connect works with OAuth 2.0 and it allows clients to verify the identity of end users without managing their credentials.

A

OpenID

99
Q

_______ _________ is concerned with the creation, management, disablement, and termination of accounts.

A

Account management

100
Q

_____ _________ specifies that individuals and processes are granted only the rights and permissions needed to perform assigned tasks or functions, but no more.

A

Least privilege

101
Q

A primary goal of implementing least privilege is to ______ risks

A

Reduce

102
Q

Least privilege is a _______ control.

A

Technical

103
Q

True or False : The principle of need to know is that users are granted access only to the data and information that they need to know for their job.

A

True

104
Q

What is the difference between least privilege and need to know?

A

The difference is that least privilege focuses on access (rights and permissions) and need to know focuses on data and information

105
Q

List some common types of accounts

A
  1. End user accounts
  2. Privileged accounts
  3. Guest accounts
  4. Service accounts
106
Q

A _________ account has additional rights and privileges beyond what a regular user has

A

Privileged

107
Q

True or False : Administrators commonly disable the Guest account and only enable it in special situations.

A

True

108
Q

Some applications and services need to run under the context of an account and a _______ account fills this need.

A

Service

109
Q

True or False : Service accounts are like regular end user accounts except it’s only being used by a service or application.

A

True

110
Q

True or False : One of the challenges with service accounts is that they often aren’t managed.

A

True

111
Q

True or False : It’s common to require administrators to have two accounts. They use one account for regular day-to-day work. It has the same limited privileges as a regular end user. The other account has elevated privileges required to perform administrative work, and they use this only when performing administrative work

A

True

112
Q

True or False : Users should not use shared accounts

A

True

113
Q

Many organizations have a _________ policy that specifies how to manage accounts in different situations.

A

Disablement

114
Q

True or False : Disabling accounts is preferred over deleting the account, at least initially. If administrators delete the account, they also delete any encryption and security keys associated with the account. However, these keys are retained when the account is disabled.

A

True

115
Q

True or False : Some contents of an account disablement policy:

  1. Terminated employee
  2. Leave of absence
  3. Delete account
A

True

116
Q

True or False :
An account disablement policy identifies what to do with accounts for employees who leave permanently or on a leave of absence. Most policies require administrators to disable the account as soon as possible, so that ex-employees cannot use the account. Disabling the account ensures that data associated with it remains available. Security keys associated with an account remain available when the account is disabled, but are no longer accessible if the account is deleted.

A

True

117
Q

True or False : Two primary account recovery scenarios are:

  1. Enable a disabled account
  2. Recover a deleted account
A

True

118
Q

____ __ ___ restrictions specify when users can log on to a computer. If a user tries to log on to the network outside the restricted time, the system denies access to the user

A

Time-of-day

119
Q

True or False with time of day restrictions once the end of day threshold has been reached it automatically logs out active sessions

A

False

It leaves active sessions but does not allow new sessions

120
Q

_______ _____ policies restrict access based on the location of the user

A

Location-based

121
Q

True or False : With location based policies you can either blacklist or whitelist IP addresses or filter MAC addresses

A

True

122
Q

True or False : It’s possible to set user accounts to expire automatically. When the account expires, the system disables it, and the user is no longer able to log on using the account

A

True

123
Q

Administrators routinely perform account maintenance. This is often done with _____ to automate the processes

A

Scripts

124
Q

A __________ is a collection of information that provides an identity (such as a username) and proves that identity (such as with a password).

A

Credential

125
Q

List some examples of credential management systems

A
  1. Windows 10 Credential Manager
  2. Google Chrome

These store credentials in secure vaults for future use

126
Q

______ control ensures that only authenticated and authorized entities can access resources.

A

Access

127
Q

______ _____ access control (role-BAC) uses roles to manage rights and permissions for users.

A

Role-based

128
Q

True or False : With role-BAC, an administrator creates the roles and then assigns specific rights and permissions to the roles (instead of to the users). When an administrator adds a user to a role, the user has all the rights and permissions of that role.

A

True

129
Q

True or False : It’s common to document role-based permissions with a matrix listing all of the job titles and the privileges for each role.

A

True

130
Q

Role-BAC is also called _________-based or job-based:

A

Hierarchy

131
Q

True or False : Administrators commonly grant access in the role-BAC model using roles, and they often implement roles as groups known as group-based access control

A

True

132
Q

True or False : In Windows, The Administrators group is an example of a built-in security group.

A

True

133
Q

True or False : Without groups, you would use user-assigned privileges. In other words, you would assign all the specific rights and permissions for every user individually. This might work for one or two users, but quickly becomes unmanageable with more users.

A

True

134
Q

True or False : Group-based privileges reduce the administrative workload of access management. Administrators put user accounts into security groups, and assign privileges to the groups. Users within a group automatically inherit the privileges assigned to the group.

A

True

135
Q

____-based access control (____-BAC) uses ____.

A

Rule(s)

136
Q

Routers and firewalls use _____ within access control lists (ACLs). These _____ define the traffic that the devices allow into the network, such as allowing Hypertext Transfer Protocol (HTTP) traffic for web browsers. These _____ are typically static. In other words, administrators create the ______ and the ______ stay the same unless an administrator changes them again.

A

Rules

137
Q

True or False : Some rules can be dynamic.

A

True

For example, intrusion prevention systems can detect attacks, and then modify rules to block traffic from an attacker.

138
Q

True or False : it’s possible to configure user applications with rules i.e. database rule to trigger a change to permissions

A

True

139
Q

In the _________ access control (DAC) model, every object (such as files and folders) has an owner, and the owner establishes access for the objects.

A

Discretionary

140
Q

True or False : A common example of the DAC model is the New Technology File System (NTFS) used in Windows.

A

True

141
Q

True or False : Microsoft systems identify users with security identifiers (SIDs)

A

True

142
Q

True or False : Every object (such as a file or folder) includes a discretionary access control list (DACL) that identifies who can access it in a system using the DAC model. The DACL is a list of Access Control Entries (ACEs). Each ACE is composed of a SID and the permission(s) granted to the SID.

A

True

143
Q

True or False : An inherent flaw associated with the DAC model is the susceptibility to Trojan horses.

A

True

144
Q

The _________ access control (MAC) model uses labels (sometimes referred to as sensitivity labels or security labels) to determine access.

A

Mandatory

145
Q

True or False : With MAC security administrators assign labels to both subjects (users) and objects (files or folders). When the labels match, the system can grant a subject access to an object. When the labels don’t match, the access model blocks access.

A

True

146
Q

True or False : Security-enhanced Linux (SELinux)is one of the few operating systems using the mandatory access control model.

A

True

147
Q

The MAC model uses different levels of security to classify both the users and the data. These levels are defined in a _____.

A

Lattice

148
Q

True or False : The MAC model uses sensitivity labels for users and data. It is commonly used when access needs to be restricted based on a need to know. Sensitivity labels often reflect classification levels of data and clearances granted to individuals

A

True

149
Q

True or False : An administrator is responsible for establishing access, but only someone at a higher authority can define the access for subjects and objects.

A

True

150
Q

An ________-based access control (ABAC) evaluates ________ and grants access based on the value of these _________.

A

Attribute(s)

NIST 800-162

151
Q

True or False : ABAC uses policies to evaluate attributes and grant access when the system detects a match in the policy.

A

True

152
Q

True or False : Many software defined networks (SDNs) use ABAC models. Instead of rules on physical routers, policies in the ABAC system control the traffic. These policies typically use plain language statements.

A

True

153
Q

True or False : ABAC policies typically include the following four elements:

  1. Subject - user
  2. Object - resource being accessed
  3. Action - what the user is attempting to do
  4. Environment - includes everything outside of the subject and object attributes. This is often referred to as the context of the access request.
A

True